Page 10 - Threat Intelligence 8-16-2019
P. 10
Social Engineering
Social Security scams could rise following Capital One breach - The Capital One data breach
Opens a New Window. is stoking fears about a new wave of Social Security scams Opens a New
Window. , which have been on a precipitous rise in 2019.As first reported by The Wall Street
Journal, thieves could exploit the event to go after vulnerable victims. Social Security scams have
overtaken IRS imposter scams this year, becoming one of the most prevalent thievery attempts.
According to Capital One, about 140,000 Social Security numbers belonging to its credit card
customers could have been compromised. However, scammers do not need your Social Security
information in order to carry out their schemes. According to the Federal Trade Commission (FTC),
the most common Social Security scams involve imposters telling consumers their Social Security
numbers were suspended because of suspicious activity, after which victims are asked to confirm
their numbers.
Source: https://www.foxbusiness.com/personal-finance/social-security-scams-capital-one
DHS warns of potential cyber scams tied to El Paso, Dayton shootings - The Department of
Homeland Security (DHS) on Tuesday warned internet users to watch out for potential “malicious
cyber activity” that seeks to take advantage of the shootings over the weekend in El Paso, Texas,
and Dayton, Ohio. Specifically, DHS’s Cybersecurity and Infrastructure Security Agency (CISA)
recommended that users should “exercise caution” in opening emails or email attachments that
refer to either of the shooting incidents, which together led to the deaths of more than 30 people
and to dozens of injuries. CISA noted that these emails and attachments could direct users to
malware-infected websites.
Source: https://thehill.com/policy/cybersecurity/456440-dhs-warns-of-potential-cyber-
scams-tied-to-el-paso-dayton-shootings
APT34 spread malware via LinkedIn invites - FireEye researchers identified a phishing campaign
conducted by the cyberespionage group APT34 masquerading as a member of Cambridge
University to gain their victim’s trust to open malicious documents. Researchers noticed the
campaign in late June 2019 using LinkedIn professional network invitations to deliver the malicious
documents that included the use of three new malware families according to a July 18 blog post.
Source: https://www.scmagazine.com/home/security-news/apts-cyberespionage/fireeye-
researchers-identified-a-phishing-campaign-conducted-by-apt34-masquerading-as-a-
member-of-cambridge-university-to-gain-their-victims-trust-to-open-malicious-
documents/
www.accumepartners.com
10